File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

권철현

Kwon, Cheolhyeon
High Assurance Mobility Control Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace US -
dc.citation.conferencePlace Minneapolis, MN -
dc.citation.title AIAA Guidance, Navigation, and Control Conference 2012 -
dc.contributor.author Liu, W -
dc.contributor.author Kwon, Cheolhyeon -
dc.contributor.author Aljanabi, I -
dc.contributor.author Hwang, I -
dc.date.accessioned 2023-12-20T02:06:08Z -
dc.date.available 2023-12-20T02:06:08Z -
dc.date.created 2019-07-25 -
dc.date.issued 2012-08-13 -
dc.description.abstract Cyber security has emerged as one of the most important issues in modern Air Traf- fic Control (ATC) systems whose functionalities heavily rely on communications between networked agents in the system. Since the current ATC systems has not incorporated mechanisms specifically designed to protect their cyber security, potential cyber attacks such as GPS spoofing, false data injection and computer virus may threat the safety of the systems. This paper is focused on the cyber security of linear state estimators (Kalman fil- ters) which are widely used in ATC systems for aircraft surveillance and control. Compared with other components in the ATC system, state estimators can be more easily attacked because they directly process the raw sensor and communication data which can be directly falsified by cyber attacks. Since cyber attacks rarely happen, accurately modeling cyber attacks is usually intractable. Therefore, this paper analyzes all possible attack cases to identify the estimator's security hole in the worst case. Specifically for a class of linear estimators, namely, the α-β filter, which has wide applications, the optimization tools are used to identify the most dangerous attack sequence among all stealthy cyber attacks. The approach proposed in this paper is general and can be applied to other systems' security analysis. -
dc.identifier.bibliographicCitation AIAA Guidance, Navigation, and Control Conference 2012 -
dc.identifier.issn 0000-0000 -
dc.identifier.scopusid 2-s2.0-84880580594 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/34924 -
dc.language 영어 -
dc.publisher American Institute of Aeronautics and Astronautics (AIAA) -
dc.title Cyber security analysis for state estimators in air traffic control systems -
dc.type Conference Paper -
dc.date.conferenceDate 2012-08-13 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.